Security researchers have discovered this week a new ransomware strain targeting macOS users.
Named OSX.EvilQuest, this ransomware is different from previous macOS ransomware threats because besides encrypting the victim’s files, EvilQuest also installs a keylogger, a reverse shell, and steals cryptocurrency wallet-related files from infected hosts.
“Armed with these capabilities, the attacker can main full control over an infected host,” said Patrick Wardle, Principal Security Researcher at Jamf. This means that even if victims paid, the attacker would still have access to their computer and continue to steal files and keyboard strokes.
Wardle is currently one of the many macOS security researchers who are analyzing this new threat.
Reed and Stokes are currently looking for a weakness or bug in the ransomware’s encryption scheme that could be exploited to create a decryptor and help infected victims recover their files without paying the ransom.
EvilQuest is distributed via pirated software
But the researcher who first spotted the new EvilQuest ransomware is K7 Lab security researcher Dinesh Devadoss.
Devadoss tweeted about his finding yesterday, June 29. However, new evidence surfaced in the meantime has revealed that EvilQuest has been, in reality, distributed in the wild since the start of June 2020.
Reed told ZDNet in a phone call today that Malwarebytes has found EvilQuest hidden inside pirated macOS software uploaded on torrent portals and online forums.
Devadoos has spotted EvilQuest hidden in a software package called Google Software Update, Wardle has found samples of EvilQuest inside a pirated version of popular DJ software Mixed In Key, and Reed has spotted it hidden inside the macOS security tool called Little Snitch.
Image: ZDNet via Malwarebytes
However, Reed told us he believes the ransomware is most likely more broadly distributed, leveraging many more other apps, and not just these three.
Wardle, who published an in-depth technical analysis of EvilQuest earlier today, said the malware is pretty straightforward, as it moves to encrypt the user’s files as soon as it’s executed.
Once the file encryption scheme ends, a popup is shown to the user, letting the victim know they’ve been infected and their files encrypted.
Image: Dinesh Devadoss
The victim is directed to open a ransom note in the form of a text file that has been placed on their desktop, which looks like the one below:
Image: Patrick Wardle
Stokes told ZDNet the ransomware will encrypt any files with the following file extensions:
.pdf, .doc, .jpg, .txt, .pages, .pem, .cer, .crt, .php, .py, .h, .m, .hpp, .cpp, .cs, .pl, .p, .p3, .html, .webarchive, .zip, .xsl, .xslx, .docx, .ppt, .pptx, .keynote, .js, .sqlite3, .wallet, .dat
After the encryption process ends, the ransomware installs a keylogger to record all the user’s keystrokes, a reverse shell so the attacker can connect to the infected host and run custom commands, and will also look to steal the following types of files, usually employed by cryptocurrency wallet applications.
In his own analysis of EvilQuest, Reed also noted that the ransomware also attempts to modify files specific to Google Chrome’s update mechanism, and use the files as a form of persistence on infected hosts.
“These [Chrome update] files had the content of the patch file prepended to them, which of course would mean that the malicious code would run when any of these files is executed,” Reed said. “However, Chrome will see that the files have been modified, and will replace the modified files with clean copies as soon as it runs, so it’s unclear what the purpose here is.”
Wardle, who has created several open-source macOS security tools, said that a tool he released in 2016, named RansomWhere, can detect and stop EvilQuest from running. Reed also said that Malwarebytes for Mac was also updated to detect and stop this ransomware before it does any damage.
EvilQuest is the third ransomware strain that has exclusively targeted macOS users after KeRanger and Patcher. Another macOS ransomware strain called Mabouia only existed at a theoretical level and was never released in the real world.
READ MORE HERE